diff options
-rw-r--r-- | ssh-keygen.1 | 14 | ||||
-rw-r--r-- | ssh-keysign.8 | 6 | ||||
-rw-r--r-- | ssh.1 | 66 | ||||
-rw-r--r-- | ssh_config.5 | 23 | ||||
-rw-r--r-- | sshd.8 | 16 | ||||
-rw-r--r-- | sshd_config.5 | 27 |
6 files changed, 55 insertions, 97 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1 index 74b3124f5..37a4fc2b2 100644 --- a/ssh-keygen.1 +++ b/ssh-keygen.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keygen.1,v 1.129 2015/11/13 04:34:15 djm Exp $ | 1 | .\" $OpenBSD: ssh-keygen.1,v 1.130 2016/02/17 07:38:19 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -35,7 +35,7 @@ | |||
35 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 35 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
36 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 36 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
37 | .\" | 37 | .\" |
38 | .Dd $Mdocdate: November 13 2015 $ | 38 | .Dd $Mdocdate: February 17 2016 $ |
39 | .Dt SSH-KEYGEN 1 | 39 | .Dt SSH-KEYGEN 1 |
40 | .Os | 40 | .Os |
41 | .Sh NAME | 41 | .Sh NAME |
@@ -141,8 +141,12 @@ | |||
141 | generates, manages and converts authentication keys for | 141 | generates, manages and converts authentication keys for |
142 | .Xr ssh 1 . | 142 | .Xr ssh 1 . |
143 | .Nm | 143 | .Nm |
144 | can create RSA keys for use by SSH protocol version 1 and | 144 | can create keys for use by SSH protocol versions 1 and 2. |
145 | DSA, ECDSA, Ed25519 or RSA keys for use by SSH protocol version 2. | 145 | Protocol 1 should not be used |
146 | and is only offered to support legacy devices. | ||
147 | It suffers from a number of cryptographic weaknesses | ||
148 | and doesn't support many of the advanced features available for protocol 2. | ||
149 | .Pp | ||
146 | The type of key to be generated is specified with the | 150 | The type of key to be generated is specified with the |
147 | .Fl t | 151 | .Fl t |
148 | option. | 152 | option. |
@@ -474,7 +478,7 @@ At present, no options are valid for host keys. | |||
474 | .It Fl o | 478 | .It Fl o |
475 | Causes | 479 | Causes |
476 | .Nm | 480 | .Nm |
477 | to save SSH protocol 2 private keys using the new OpenSSH format rather than | 481 | to save private keys using the new OpenSSH format rather than |
478 | the more compatible PEM format. | 482 | the more compatible PEM format. |
479 | The new format has increased resistance to brute-force password cracking | 483 | The new format has increased resistance to brute-force password cracking |
480 | but is not supported by versions of OpenSSH prior to 6.5. | 484 | but is not supported by versions of OpenSSH prior to 6.5. |
diff --git a/ssh-keysign.8 b/ssh-keysign.8 index 69d082954..19b0dbc53 100644 --- a/ssh-keysign.8 +++ b/ssh-keysign.8 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keysign.8,v 1.14 2013/12/07 11:58:46 naddy Exp $ | 1 | .\" $OpenBSD: ssh-keysign.8,v 1.15 2016/02/17 07:38:19 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2002 Markus Friedl. All rights reserved. | 3 | .\" Copyright (c) 2002 Markus Friedl. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -22,7 +22,7 @@ | |||
22 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 22 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
23 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 23 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
24 | .\" | 24 | .\" |
25 | .Dd $Mdocdate: December 7 2013 $ | 25 | .Dd $Mdocdate: February 17 2016 $ |
26 | .Dt SSH-KEYSIGN 8 | 26 | .Dt SSH-KEYSIGN 8 |
27 | .Os | 27 | .Os |
28 | .Sh NAME | 28 | .Sh NAME |
@@ -35,7 +35,7 @@ | |||
35 | is used by | 35 | is used by |
36 | .Xr ssh 1 | 36 | .Xr ssh 1 |
37 | to access the local host keys and generate the digital signature | 37 | to access the local host keys and generate the digital signature |
38 | required during host-based authentication with SSH protocol version 2. | 38 | required during host-based authentication. |
39 | .Pp | 39 | .Pp |
40 | .Nm | 40 | .Nm |
41 | is disabled by default and can only be enabled in the | 41 | is disabled by default and can only be enabled in the |
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: ssh.1,v 1.368 2016/02/16 07:47:54 jmc Exp $ | 36 | .\" $OpenBSD: ssh.1,v 1.369 2016/02/17 07:38:19 jmc Exp $ |
37 | .Dd $Mdocdate: February 16 2016 $ | 37 | .Dd $Mdocdate: February 17 2016 $ |
38 | .Dt SSH 1 | 38 | .Dt SSH 1 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -402,17 +402,15 @@ in | |||
402 | for details. | 402 | for details. |
403 | .Pp | 403 | .Pp |
404 | .It Fl m Ar mac_spec | 404 | .It Fl m Ar mac_spec |
405 | Additionally, for protocol version 2 a comma-separated list of MAC | 405 | A comma-separated list of MAC (message authentication code) algorithms, |
406 | (message authentication code) algorithms can | 406 | specified in order of preference. |
407 | be specified in order of preference. | ||
408 | See the | 407 | See the |
409 | .Cm MACs | 408 | .Cm MACs |
410 | keyword for more information. | 409 | keyword for more information. |
411 | .Pp | 410 | .Pp |
412 | .It Fl N | 411 | .It Fl N |
413 | Do not execute a remote command. | 412 | Do not execute a remote command. |
414 | This is useful for just forwarding ports | 413 | This is useful for just forwarding ports. |
415 | (protocol version 2 only). | ||
416 | .Pp | 414 | .Pp |
417 | .It Fl n | 415 | .It Fl n |
418 | Redirects stdin from | 416 | Redirects stdin from |
@@ -664,8 +662,8 @@ for details. | |||
664 | .Pp | 662 | .Pp |
665 | .It Fl s | 663 | .It Fl s |
666 | May be used to request invocation of a subsystem on the remote system. | 664 | May be used to request invocation of a subsystem on the remote system. |
667 | Subsystems are a feature of the SSH2 protocol which facilitate the use | 665 | Subsystems facilitate the use of SSH |
668 | of SSH as a secure transport for other applications (eg.\& | 666 | as a secure transport for other applications (e.g.\& |
669 | .Xr sftp 1 ) . | 667 | .Xr sftp 1 ) . |
670 | The subsystem is specified as the remote command. | 668 | The subsystem is specified as the remote command. |
671 | .Pp | 669 | .Pp |
@@ -710,7 +708,6 @@ Implies | |||
710 | .Cm ExitOnForwardFailure | 708 | .Cm ExitOnForwardFailure |
711 | and | 709 | and |
712 | .Cm ClearAllForwardings . | 710 | .Cm ClearAllForwardings . |
713 | Works with Protocol version 2 only. | ||
714 | .Pp | 711 | .Pp |
715 | .It Fl w Xo | 712 | .It Fl w Xo |
716 | .Ar local_tun Ns Op : Ns Ar remote_tun | 713 | .Ar local_tun Ns Op : Ns Ar remote_tun |
@@ -795,8 +792,10 @@ or the | |||
795 | and | 792 | and |
796 | .Fl 2 | 793 | .Fl 2 |
797 | options (see above). | 794 | options (see above). |
798 | Protocol 1 should not be used - it suffers from a number of cryptographic | 795 | Protocol 1 should not be used |
799 | weaknesses and is only offered to support legacy devices. | 796 | and is only offered to support legacy devices. |
797 | It suffers from a number of cryptographic weaknesses | ||
798 | and doesn't support many of the advanced features available for protocol 2. | ||
800 | .Pp | 799 | .Pp |
801 | The methods available for authentication are: | 800 | The methods available for authentication are: |
802 | GSSAPI-based authentication, | 801 | GSSAPI-based authentication, |
@@ -805,8 +804,9 @@ public key authentication, | |||
805 | challenge-response authentication, | 804 | challenge-response authentication, |
806 | and password authentication. | 805 | and password authentication. |
807 | Authentication methods are tried in the order specified above, | 806 | Authentication methods are tried in the order specified above, |
808 | though protocol 2 has a configuration option to change the default order: | 807 | though |
809 | .Cm PreferredAuthentications . | 808 | .Cm PreferredAuthentications |
809 | can be used to change the default order. | ||
810 | .Pp | 810 | .Pp |
811 | Host-based authentication works as follows: | 811 | Host-based authentication works as follows: |
812 | If the machine the user logs in from is listed in | 812 | If the machine the user logs in from is listed in |
@@ -850,8 +850,6 @@ The server knows the public key, and only the user knows the private key. | |||
850 | .Nm | 850 | .Nm |
851 | implements public key authentication protocol automatically, | 851 | implements public key authentication protocol automatically, |
852 | using one of the DSA, ECDSA, Ed25519 or RSA algorithms. | 852 | using one of the DSA, ECDSA, Ed25519 or RSA algorithms. |
853 | Protocol 1 is restricted to using only RSA keys, | ||
854 | but protocol 2 may use any. | ||
855 | The HISTORY section of | 853 | The HISTORY section of |
856 | .Xr ssl 8 | 854 | .Xr ssl 8 |
857 | contains a brief discussion of the DSA and RSA algorithms. | 855 | contains a brief discussion of the DSA and RSA algorithms. |
@@ -873,26 +871,26 @@ This stores the private key in | |||
873 | .Pa ~/.ssh/identity | 871 | .Pa ~/.ssh/identity |
874 | (protocol 1), | 872 | (protocol 1), |
875 | .Pa ~/.ssh/id_dsa | 873 | .Pa ~/.ssh/id_dsa |
876 | (protocol 2 DSA), | 874 | (DSA), |
877 | .Pa ~/.ssh/id_ecdsa | 875 | .Pa ~/.ssh/id_ecdsa |
878 | (protocol 2 ECDSA), | 876 | (ECDSA), |
879 | .Pa ~/.ssh/id_ed25519 | 877 | .Pa ~/.ssh/id_ed25519 |
880 | (protocol 2 Ed25519), | 878 | (Ed25519), |
881 | or | 879 | or |
882 | .Pa ~/.ssh/id_rsa | 880 | .Pa ~/.ssh/id_rsa |
883 | (protocol 2 RSA) | 881 | (RSA) |
884 | and stores the public key in | 882 | and stores the public key in |
885 | .Pa ~/.ssh/identity.pub | 883 | .Pa ~/.ssh/identity.pub |
886 | (protocol 1), | 884 | (protocol 1), |
887 | .Pa ~/.ssh/id_dsa.pub | 885 | .Pa ~/.ssh/id_dsa.pub |
888 | (protocol 2 DSA), | 886 | (DSA), |
889 | .Pa ~/.ssh/id_ecdsa.pub | 887 | .Pa ~/.ssh/id_ecdsa.pub |
890 | (protocol 2 ECDSA), | 888 | (ECDSA), |
891 | .Pa ~/.ssh/id_ed25519.pub | 889 | .Pa ~/.ssh/id_ed25519.pub |
892 | (protocol 2 Ed25519), | 890 | (Ed25519), |
893 | or | 891 | or |
894 | .Pa ~/.ssh/id_rsa.pub | 892 | .Pa ~/.ssh/id_rsa.pub |
895 | (protocol 2 RSA) | 893 | (RSA) |
896 | in the user's home directory. | 894 | in the user's home directory. |
897 | The user should then copy the public key | 895 | The user should then copy the public key |
898 | to | 896 | to |
@@ -930,8 +928,6 @@ Challenge-response authentication works as follows: | |||
930 | The server sends an arbitrary | 928 | The server sends an arbitrary |
931 | .Qq challenge | 929 | .Qq challenge |
932 | text, and prompts for a response. | 930 | text, and prompts for a response. |
933 | Protocol 2 allows multiple challenges and responses; | ||
934 | protocol 1 is restricted to just one challenge/response. | ||
935 | Examples of challenge-response authentication include | 931 | Examples of challenge-response authentication include |
936 | .Bx | 932 | .Bx |
937 | Authentication (see | 933 | Authentication (see |
@@ -1030,7 +1026,7 @@ at logout when waiting for forwarded connection / X11 sessions to terminate. | |||
1030 | Display a list of escape characters. | 1026 | Display a list of escape characters. |
1031 | .It Cm ~B | 1027 | .It Cm ~B |
1032 | Send a BREAK to the remote system | 1028 | Send a BREAK to the remote system |
1033 | (only useful for SSH protocol version 2 and if the peer supports it). | 1029 | (only useful if the peer supports it). |
1034 | .It Cm ~C | 1030 | .It Cm ~C |
1035 | Open command line. | 1031 | Open command line. |
1036 | Currently this allows the addition of port forwardings using the | 1032 | Currently this allows the addition of port forwardings using the |
@@ -1063,7 +1059,7 @@ Basic help is available, using the | |||
1063 | option. | 1059 | option. |
1064 | .It Cm ~R | 1060 | .It Cm ~R |
1065 | Request rekeying of the connection | 1061 | Request rekeying of the connection |
1066 | (only useful for SSH protocol version 2 and if the peer supports it). | 1062 | (only useful if the peer supports it). |
1067 | .It Cm ~V | 1063 | .It Cm ~V |
1068 | Decrease the verbosity | 1064 | Decrease the verbosity |
1069 | .Pq Ic LogLevel | 1065 | .Pq Ic LogLevel |
@@ -1531,20 +1527,6 @@ The file format and configuration options are described in | |||
1531 | .It Pa /etc/ssh/ssh_host_rsa_key | 1527 | .It Pa /etc/ssh/ssh_host_rsa_key |
1532 | These files contain the private parts of the host keys | 1528 | These files contain the private parts of the host keys |
1533 | and are used for host-based authentication. | 1529 | and are used for host-based authentication. |
1534 | If protocol version 1 is used, | ||
1535 | .Nm | ||
1536 | must be setuid root, since the host key is readable only by root. | ||
1537 | For protocol version 2, | ||
1538 | .Nm | ||
1539 | uses | ||
1540 | .Xr ssh-keysign 8 | ||
1541 | to access the host keys, | ||
1542 | eliminating the requirement that | ||
1543 | .Nm | ||
1544 | be setuid root when host-based authentication is used. | ||
1545 | By default | ||
1546 | .Nm | ||
1547 | is not setuid root. | ||
1548 | .Pp | 1530 | .Pp |
1549 | .It Pa /etc/ssh/ssh_known_hosts | 1531 | .It Pa /etc/ssh/ssh_known_hosts |
1550 | Systemwide list of known host keys. | 1532 | Systemwide list of known host keys. |
diff --git a/ssh_config.5 b/ssh_config.5 index c8ccfecb4..fcd538066 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: ssh_config.5,v 1.225 2016/02/16 05:11:04 djm Exp $ | 36 | .\" $OpenBSD: ssh_config.5,v 1.226 2016/02/17 07:38:19 jmc Exp $ |
37 | .Dd $Mdocdate: February 16 2016 $ | 37 | .Dd $Mdocdate: February 17 2016 $ |
38 | .Dt SSH_CONFIG 5 | 38 | .Dt SSH_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -824,12 +824,10 @@ The default is | |||
824 | Specifies whether user authentication based on GSSAPI is allowed. | 824 | Specifies whether user authentication based on GSSAPI is allowed. |
825 | The default is | 825 | The default is |
826 | .Dq no . | 826 | .Dq no . |
827 | Note that this option applies to protocol version 2 only. | ||
828 | .It Cm GSSAPIDelegateCredentials | 827 | .It Cm GSSAPIDelegateCredentials |
829 | Forward (delegate) credentials to the server. | 828 | Forward (delegate) credentials to the server. |
830 | The default is | 829 | The default is |
831 | .Dq no . | 830 | .Dq no . |
832 | Note that this option applies to protocol version 2 only. | ||
833 | .It Cm HashKnownHosts | 831 | .It Cm HashKnownHosts |
834 | Indicates that | 832 | Indicates that |
835 | .Xr ssh 1 | 833 | .Xr ssh 1 |
@@ -856,9 +854,6 @@ or | |||
856 | .Dq no . | 854 | .Dq no . |
857 | The default is | 855 | The default is |
858 | .Dq no . | 856 | .Dq no . |
859 | This option applies to protocol version 2 only and | ||
860 | is similar to | ||
861 | .Cm RhostsRSAAuthentication . | ||
862 | .It Cm HostbasedKeyTypes | 857 | .It Cm HostbasedKeyTypes |
863 | Specifies the key types that will be used for hostbased authentication | 858 | Specifies the key types that will be used for hostbased authentication |
864 | as a comma-separated pattern list. | 859 | as a comma-separated pattern list. |
@@ -883,7 +878,7 @@ option of | |||
883 | .Xr ssh 1 | 878 | .Xr ssh 1 |
884 | may be used to list supported key types. | 879 | may be used to list supported key types. |
885 | .It Cm HostKeyAlgorithms | 880 | .It Cm HostKeyAlgorithms |
886 | Specifies the protocol version 2 host key algorithms | 881 | Specifies the host key algorithms |
887 | that the client wants to use in order of preference. | 882 | that the client wants to use in order of preference. |
888 | Alternately if the specified value begins with a | 883 | Alternately if the specified value begins with a |
889 | .Sq + | 884 | .Sq + |
@@ -1170,8 +1165,7 @@ DEBUG2 and DEBUG3 each specify higher levels of verbose output. | |||
1170 | .It Cm MACs | 1165 | .It Cm MACs |
1171 | Specifies the MAC (message authentication code) algorithms | 1166 | Specifies the MAC (message authentication code) algorithms |
1172 | in order of preference. | 1167 | in order of preference. |
1173 | The MAC algorithm is used in protocol version 2 | 1168 | The MAC algorithm is used for data integrity protection. |
1174 | for data integrity protection. | ||
1175 | Multiple algorithms must be comma-separated. | 1169 | Multiple algorithms must be comma-separated. |
1176 | If the specified value begins with a | 1170 | If the specified value begins with a |
1177 | .Sq + | 1171 | .Sq + |
@@ -1243,8 +1237,7 @@ private RSA key. | |||
1243 | Specifies the port number to connect on the remote host. | 1237 | Specifies the port number to connect on the remote host. |
1244 | The default is 22. | 1238 | The default is 22. |
1245 | .It Cm PreferredAuthentications | 1239 | .It Cm PreferredAuthentications |
1246 | Specifies the order in which the client should try protocol 2 | 1240 | Specifies the order in which the client should try authentication methods. |
1247 | authentication methods. | ||
1248 | This allows a client to prefer one method (e.g.\& | 1241 | This allows a client to prefer one method (e.g.\& |
1249 | .Cm keyboard-interactive ) | 1242 | .Cm keyboard-interactive ) |
1250 | over another method (e.g.\& | 1243 | over another method (e.g.\& |
@@ -1353,7 +1346,6 @@ or | |||
1353 | .Dq no . | 1346 | .Dq no . |
1354 | The default is | 1347 | The default is |
1355 | .Dq yes . | 1348 | .Dq yes . |
1356 | This option applies to protocol version 2 only. | ||
1357 | .It Cm RekeyLimit | 1349 | .It Cm RekeyLimit |
1358 | Specifies the maximum amount of data that may be transmitted before the | 1350 | Specifies the maximum amount of data that may be transmitted before the |
1359 | session key is renegotiated, optionally followed a maximum amount of | 1351 | session key is renegotiated, optionally followed a maximum amount of |
@@ -1379,7 +1371,6 @@ is | |||
1379 | .Dq default none , | 1371 | .Dq default none , |
1380 | which means that rekeying is performed after the cipher's default amount | 1372 | which means that rekeying is performed after the cipher's default amount |
1381 | of data has been sent or received and no time based rekeying is done. | 1373 | of data has been sent or received and no time based rekeying is done. |
1382 | This option applies to protocol version 2 only. | ||
1383 | .It Cm RemoteForward | 1374 | .It Cm RemoteForward |
1384 | Specifies that a TCP port on the remote machine be forwarded over | 1375 | Specifies that a TCP port on the remote machine be forwarded over |
1385 | the secure channel to the specified host and port from the local machine. | 1376 | the secure channel to the specified host and port from the local machine. |
@@ -1472,7 +1463,6 @@ Note that this option applies to protocol version 1 only. | |||
1472 | Specifies what variables from the local | 1463 | Specifies what variables from the local |
1473 | .Xr environ 7 | 1464 | .Xr environ 7 |
1474 | should be sent to the server. | 1465 | should be sent to the server. |
1475 | Note that environment passing is only supported for protocol 2. | ||
1476 | The server must also support it, and the server must be configured to | 1466 | The server must also support it, and the server must be configured to |
1477 | accept these environment variables. | 1467 | accept these environment variables. |
1478 | Note that the | 1468 | Note that the |
@@ -1520,7 +1510,6 @@ If, for example, | |||
1520 | .Cm ServerAliveCountMax | 1510 | .Cm ServerAliveCountMax |
1521 | is left at the default, if the server becomes unresponsive, | 1511 | is left at the default, if the server becomes unresponsive, |
1522 | ssh will disconnect after approximately 45 seconds. | 1512 | ssh will disconnect after approximately 45 seconds. |
1523 | This option applies to protocol version 2 only. | ||
1524 | .It Cm ServerAliveInterval | 1513 | .It Cm ServerAliveInterval |
1525 | Sets a timeout interval in seconds after which if no data has been received | 1514 | Sets a timeout interval in seconds after which if no data has been received |
1526 | from the server, | 1515 | from the server, |
@@ -1529,7 +1518,6 @@ will send a message through the encrypted | |||
1529 | channel to request a response from the server. | 1518 | channel to request a response from the server. |
1530 | The default | 1519 | The default |
1531 | is 0, indicating that these messages will not be sent to the server. | 1520 | is 0, indicating that these messages will not be sent to the server. |
1532 | This option applies to protocol version 2 only. | ||
1533 | .It Cm StreamLocalBindMask | 1521 | .It Cm StreamLocalBindMask |
1534 | Sets the octal file creation mode mask | 1522 | Sets the octal file creation mode mask |
1535 | .Pq umask | 1523 | .Pq umask |
@@ -1726,7 +1714,6 @@ or | |||
1726 | .Dq ask . | 1714 | .Dq ask . |
1727 | The default is | 1715 | The default is |
1728 | .Dq no . | 1716 | .Dq no . |
1729 | Note that this option applies to protocol version 2 only. | ||
1730 | .Pp | 1717 | .Pp |
1731 | See also VERIFYING HOST KEYS in | 1718 | See also VERIFYING HOST KEYS in |
1732 | .Xr ssh 1 . | 1719 | .Xr ssh 1 . |
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: sshd.8,v 1.283 2016/02/05 03:07:06 djm Exp $ | 36 | .\" $OpenBSD: sshd.8,v 1.284 2016/02/17 07:38:19 jmc Exp $ |
37 | .Dd $Mdocdate: February 5 2016 $ | 37 | .Dd $Mdocdate: February 17 2016 $ |
38 | .Dt SSHD 8 | 38 | .Dt SSHD 8 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -275,14 +275,12 @@ though this can be changed via the | |||
275 | .Cm Protocol | 275 | .Cm Protocol |
276 | option in | 276 | option in |
277 | .Xr sshd_config 5 . | 277 | .Xr sshd_config 5 . |
278 | Protocol 2 supports DSA, ECDSA, Ed25519 and RSA keys; | 278 | Protocol 1 should not be used |
279 | protocol 1 only supports RSA keys. | 279 | and is only offered to support legacy devices. |
280 | For both protocols, | ||
281 | each host has a host-specific key, | ||
282 | normally 2048 bits, | ||
283 | used to identify the host. | ||
284 | .Pp | 280 | .Pp |
285 | Forward security for protocol 1 is provided through | 281 | Each host has a host-specific key, |
282 | used to identify the host. | ||
283 | Partial forward security for protocol 1 is provided through | ||
286 | an additional server key, | 284 | an additional server key, |
287 | normally 1024 bits, | 285 | normally 1024 bits, |
288 | generated when the server starts. | 286 | generated when the server starts. |
diff --git a/sshd_config.5 b/sshd_config.5 index 711a02524..ef9190568 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: sshd_config.5,v 1.218 2016/02/16 05:11:04 djm Exp $ | 36 | .\" $OpenBSD: sshd_config.5,v 1.219 2016/02/17 07:38:19 jmc Exp $ |
37 | .Dd $Mdocdate: February 16 2016 $ | 37 | .Dd $Mdocdate: February 17 2016 $ |
38 | .Dt SSHD_CONFIG 5 | 38 | .Dt SSHD_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -70,8 +70,7 @@ See | |||
70 | in | 70 | in |
71 | .Xr ssh_config 5 | 71 | .Xr ssh_config 5 |
72 | for how to configure the client. | 72 | for how to configure the client. |
73 | Note that environment passing is only supported for protocol 2, and | 73 | The |
74 | that the | ||
75 | .Ev TERM | 74 | .Ev TERM |
76 | environment variable is always sent whenever the client | 75 | environment variable is always sent whenever the client |
77 | requests a pseudo-terminal as it is required by the protocol. | 76 | requests a pseudo-terminal as it is required by the protocol. |
@@ -226,7 +225,7 @@ of | |||
226 | .Dq publickey,publickey | 225 | .Dq publickey,publickey |
227 | will require successful authentication using two different public keys. | 226 | will require successful authentication using two different public keys. |
228 | .Pp | 227 | .Pp |
229 | This option is only available for SSH protocol 2 and will yield a fatal | 228 | This option will yield a fatal |
230 | error if enabled if protocol 1 is also enabled. | 229 | error if enabled if protocol 1 is also enabled. |
231 | Note that each authentication method listed should also be explicitly enabled | 230 | Note that each authentication method listed should also be explicitly enabled |
232 | in the configuration. | 231 | in the configuration. |
@@ -373,7 +372,6 @@ authentication is allowed. | |||
373 | If the argument is | 372 | If the argument is |
374 | .Dq none | 373 | .Dq none |
375 | then no banner is displayed. | 374 | then no banner is displayed. |
376 | This option is only available for protocol version 2. | ||
377 | By default, no banner is displayed. | 375 | By default, no banner is displayed. |
378 | .It Cm ChallengeResponseAuthentication | 376 | .It Cm ChallengeResponseAuthentication |
379 | Specifies whether challenge-response authentication is allowed (e.g. via | 377 | Specifies whether challenge-response authentication is allowed (e.g. via |
@@ -437,7 +435,7 @@ The default is | |||
437 | indicating not to | 435 | indicating not to |
438 | .Xr chroot 2 . | 436 | .Xr chroot 2 . |
439 | .It Cm Ciphers | 437 | .It Cm Ciphers |
440 | Specifies the ciphers allowed for protocol version 2. | 438 | Specifies the ciphers allowed. |
441 | Multiple ciphers must be comma-separated. | 439 | Multiple ciphers must be comma-separated. |
442 | If the specified value begins with a | 440 | If the specified value begins with a |
443 | .Sq + | 441 | .Sq + |
@@ -518,7 +516,6 @@ If | |||
518 | .Cm ClientAliveCountMax | 516 | .Cm ClientAliveCountMax |
519 | is left at the default, unresponsive SSH clients | 517 | is left at the default, unresponsive SSH clients |
520 | will be disconnected after approximately 45 seconds. | 518 | will be disconnected after approximately 45 seconds. |
521 | This option applies to protocol version 2 only. | ||
522 | .It Cm ClientAliveInterval | 519 | .It Cm ClientAliveInterval |
523 | Sets a timeout interval in seconds after which if no data has been received | 520 | Sets a timeout interval in seconds after which if no data has been received |
524 | from the client, | 521 | from the client, |
@@ -527,7 +524,6 @@ will send a message through the encrypted | |||
527 | channel to request a response from the client. | 524 | channel to request a response from the client. |
528 | The default | 525 | The default |
529 | is 0, indicating that these messages will not be sent to the client. | 526 | is 0, indicating that these messages will not be sent to the client. |
530 | This option applies to protocol version 2 only. | ||
531 | .It Cm Compression | 527 | .It Cm Compression |
532 | Specifies whether compression is allowed, or delayed until | 528 | Specifies whether compression is allowed, or delayed until |
533 | the user has authenticated successfully. | 529 | the user has authenticated successfully. |
@@ -627,13 +623,11 @@ The default is | |||
627 | Specifies whether user authentication based on GSSAPI is allowed. | 623 | Specifies whether user authentication based on GSSAPI is allowed. |
628 | The default is | 624 | The default is |
629 | .Dq no . | 625 | .Dq no . |
630 | Note that this option applies to protocol version 2 only. | ||
631 | .It Cm GSSAPICleanupCredentials | 626 | .It Cm GSSAPICleanupCredentials |
632 | Specifies whether to automatically destroy the user's credentials cache | 627 | Specifies whether to automatically destroy the user's credentials cache |
633 | on logout. | 628 | on logout. |
634 | The default is | 629 | The default is |
635 | .Dq yes . | 630 | .Dq yes . |
636 | Note that this option applies to protocol version 2 only. | ||
637 | .It Cm GSSAPIStrictAcceptorCheck | 631 | .It Cm GSSAPIStrictAcceptorCheck |
638 | Determines whether to be strict about the identity of the GSSAPI acceptor | 632 | Determines whether to be strict about the identity of the GSSAPI acceptor |
639 | a client authenticates against. | 633 | a client authenticates against. |
@@ -676,9 +670,6 @@ may be used to list supported key types. | |||
676 | Specifies whether rhosts or /etc/hosts.equiv authentication together | 670 | Specifies whether rhosts or /etc/hosts.equiv authentication together |
677 | with successful public key client host authentication is allowed | 671 | with successful public key client host authentication is allowed |
678 | (host-based authentication). | 672 | (host-based authentication). |
679 | This option is similar to | ||
680 | .Cm RhostsRSAAuthentication | ||
681 | and applies to protocol version 2 only. | ||
682 | The default is | 673 | The default is |
683 | .Dq no . | 674 | .Dq no . |
684 | .It Cm HostbasedUsesNameFromPacketOnly | 675 | .It Cm HostbasedUsesNameFromPacketOnly |
@@ -749,7 +740,7 @@ is specified, the location of the socket will be read from the | |||
749 | .Ev SSH_AUTH_SOCK | 740 | .Ev SSH_AUTH_SOCK |
750 | environment variable. | 741 | environment variable. |
751 | .It Cm HostKeyAlgorithms | 742 | .It Cm HostKeyAlgorithms |
752 | Specifies the protocol version 2 host key algorithms | 743 | Specifies the host key algorithms |
753 | that the server offers. | 744 | that the server offers. |
754 | The default for this option is: | 745 | The default for this option is: |
755 | .Bd -literal -offset 3n | 746 | .Bd -literal -offset 3n |
@@ -970,8 +961,7 @@ DEBUG2 and DEBUG3 each specify higher levels of debugging output. | |||
970 | Logging with a DEBUG level violates the privacy of users and is not recommended. | 961 | Logging with a DEBUG level violates the privacy of users and is not recommended. |
971 | .It Cm MACs | 962 | .It Cm MACs |
972 | Specifies the available MAC (message authentication code) algorithms. | 963 | Specifies the available MAC (message authentication code) algorithms. |
973 | The MAC algorithm is used in protocol version 2 | 964 | The MAC algorithm is used for data integrity protection. |
974 | for data integrity protection. | ||
975 | Multiple algorithms must be comma-separated. | 965 | Multiple algorithms must be comma-separated. |
976 | If the specified value begins with a | 966 | If the specified value begins with a |
977 | .Sq + | 967 | .Sq + |
@@ -1380,7 +1370,6 @@ may be used to list supported key types. | |||
1380 | Specifies whether public key authentication is allowed. | 1370 | Specifies whether public key authentication is allowed. |
1381 | The default is | 1371 | The default is |
1382 | .Dq yes . | 1372 | .Dq yes . |
1383 | Note that this option applies to protocol version 2 only. | ||
1384 | .It Cm RekeyLimit | 1373 | .It Cm RekeyLimit |
1385 | Specifies the maximum amount of data that may be transmitted before the | 1374 | Specifies the maximum amount of data that may be transmitted before the |
1386 | session key is renegotiated, optionally followed a maximum amount of | 1375 | session key is renegotiated, optionally followed a maximum amount of |
@@ -1406,7 +1395,6 @@ is | |||
1406 | .Dq default none , | 1395 | .Dq default none , |
1407 | which means that rekeying is performed after the cipher's default amount | 1396 | which means that rekeying is performed after the cipher's default amount |
1408 | of data has been sent or received and no time based rekeying is done. | 1397 | of data has been sent or received and no time based rekeying is done. |
1409 | This option applies to protocol version 2 only. | ||
1410 | .It Cm RevokedKeys | 1398 | .It Cm RevokedKeys |
1411 | Specifies revoked public keys file, or | 1399 | Specifies revoked public keys file, or |
1412 | .Dq none | 1400 | .Dq none |
@@ -1493,7 +1481,6 @@ This may simplify configurations using | |||
1493 | to force a different filesystem root on clients. | 1481 | to force a different filesystem root on clients. |
1494 | .Pp | 1482 | .Pp |
1495 | By default no subsystems are defined. | 1483 | By default no subsystems are defined. |
1496 | Note that this option applies to protocol version 2 only. | ||
1497 | .It Cm SyslogFacility | 1484 | .It Cm SyslogFacility |
1498 | Gives the facility code that is used when logging messages from | 1485 | Gives the facility code that is used when logging messages from |
1499 | .Xr sshd 8 . | 1486 | .Xr sshd 8 . |